Analysis of multiple sleeps and N-policy on a M/G/1/K user request queue in 5g networks base station
Downloads
Published
DOI:
https://doi.org/10.58414/SCIENTIFICTEMPER.2023.14.2.21Keywords:
Mobile Network, Wireless Network, Energy Consumption, Multiple Sleeps, N- Policy, Finite capacity.Dimensions Badge
Issue
Section
License
Copyright (c) 2023 The Scientific Temper

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
The primary purpose of green communication is to reduce energy use. The base station (BS) is a radio receiver/transmitter that acts as the wireless network’s hub. It serves as a link between a wired and wireless network. To receive and transmit messages, BS uses a lot of energy. The use of effective sleep and wake-up/setup activities with an acceptable delay helps reduce base station power consumption. In this paper, the BS’s service process is modelled as a finite buffer queue with close down, sleep, and setup. After a certain number of user requests (URs) have accumulated in the system, to awaken the BS from multiple sleeps (MS) the -Policy is implemented. To produce probability generating functions, the supplementary variable approach is applied. The UR’s mean delay and the BS’s mean power consumption are calculated using simulation. According to computational studies, multiple sleeps with -policy consume less power than multiple sleeps without -policy.Abstract
How to Cite
Downloads
Similar Articles
- M. Iniyan, A. Banumathi, Brower blowfish nash secured stochastic neural network based disease diagnosis for medical WBAN in cloud environment , The Scientific Temper: Vol. 15 No. 03 (2024): The Scientific Temper
- Surender Singh, Deep Lal, Rachna Thakur, Suchitra Devi, Socio-economic Compulsions on Climate Change and Energy Security of India , The Scientific Temper: Vol. 13 No. 02 (2022): The Scientific Temper
- Yasodha V, V. Sinthu Janita, AI-driven IoT routing: A hybrid deep reinforcement learning and shrike optimization framework for energy-efficient communication , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- R. Sakthiraman, L. Arockiam, RRFSE: RNN biased random forest and SVM ensemble for RPL DDoS in IoT-WSN environment , The Scientific Temper: Vol. 16 No. 02 (2025): The Scientific Temper
- M. Monika, J. Merline Vinotha, A Sustainable Vendor–Buyer Supply Chain Framework Integrating Energy Storage Systems and Green Investments with Incentive Policies under Demand Uncertainty , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- M. Monika, J. Merline Vinotha, A resilient supply chain model integrating demand variability and carbon emissions in imperfect production systems , The Scientific Temper: Vol. 16 No. 08 (2025): The Scientific Temper
- A. Jafar Ali, Dr.G. Ravi, D.I. George Amalarethinam, AI-Driven Swarm-Optimized Adaptive Routing Using Quantum-Inspired Neural Scheduling with Homomorphic Encryption , The Scientific Temper: Vol. 17 No. 02 (2026): The Scientific Temper
- Ayalew Ali, Determinants of banks profitability: Do capital structure and dividend policy matters? , The Scientific Temper: Vol. 16 No. 04 (2025): The Scientific Temper
- R. Kalaiselvi, P. Meenakshi Sundaram, Machine learning-based ERA model for detecting Sybil attacks on mobile ad hoc networks , The Scientific Temper: Vol. 15 No. 04 (2024): The Scientific Temper
- Rekha R., P. Meenakshi Sundaram, Trust aware clustering approach for the detection of malicious nodes in the WSN , The Scientific Temper: Vol. 15 No. spl-1 (2024): The Scientific Temper
<< < 1 2 3 4 5 6 7 8 9 10 > >>
You may also start an advanced similarity search for this article.

